On any given day, you could probably find an organization that has been the victim of a data breach. Case in point: SRA International announced that its computers have been compromised after hackers managed to plant a virus on them, again not unusual. What is interesting here is that SRA International sells privacy and cybersecurity services to the U.S. government. The company would not release information on the agencies that it does business with but in a Security and Exchange filing, it listed several intelligence agencies. In addition, it listed the U.S. Department of Defense, U.S. Department of Homeland Security, and the U.S. National Guard.
SRA claims that the virus was not picked up by its antivirus software. SRA also stated in a press release that it was working with its antivirus software provider to add the virus signature to its product. In addition, the company stated that it believes that other organizations were infected by the virus.
If you believe this, I have a left-handed computer to sell you. I think this was a case of someone falling asleep at the wheel. The cat is already out of the bag. I think that SRA needs to come clean and admit that perhaps it didn't update its virus definitions or that someone may have accidentally disabled its antivirus software. I can go on with the possibilities. The fact is that no one else admitted that they were infected with this mysterious virus. Nor can I find recently opened tickets on McAfee, Symantec, or any other antivirus vendor's Web site about this mysterious virus. I understand why SRA is not admitting it may have dropped the ball with its own security. This is not just another data breach. This is about a major security company that provides security to the U.S. government having a data breach. SRA needs to understand that by making mistakes, we find out where we need work and how others could avoid the same issues.